Besides the DNS vulnerability, version 3.0.0.4.374.979 also resolves a throughput problem that can crop up with an enabled VPN server broadcast, and disables auto-mac clone (for Singapore SKU).

In addition, there is now a roaming assistance option in the Wireless → Professional menu, through which the administrator can help a user switch to a better AP signal faster.

Just last week an update became available for an Asus router that has an authentication bypass vulnerability found earlier this summer.

That vulnerability was in Asus’ RT-N10E brand of routers, sold primarily in Europe, China and South America. Asus is a Taiwanese electronics company.

The problem is once an attacker gains access to the device, they can make their way to a certain website and learn the device configuration without entering log-in credentials, said the a passage on Carnegie Mellon’s CERT Vulnerability Notes Database.

The vulnerability (CVE-2013-3610) allows attackers to view information – including the device’s administrator password – that should only be viewable to authenticated users, by being on the local area network.

Firmware update 2.0.0.25 fixes the vulnerable versions, 2.0.0.24 and earlier and also addresses two other, unrelated issues involving an “abnormal disconnection” and a problem with “IPTV connection stability after PPPoE reconnect.”